Ubiquitous security for ubiquitous computing
Information Security Tech. Report
QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Working set-based access control for network file systems
Proceedings of the 14th ACM symposium on Access control models and technologies
A generalized context-based access control model for pervasive environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Hi-index | 0.00 |
A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.